paris/i-0ba1c51e7ab08bced
by SadServersMore by SadServers
-r--r--r-- 1 root root 0 Nov 28 20:01 timers -rw-rw-rw- 1 root root 0 Nov 28 20:01 timerslack_ns -rw-r--r-- 1 root root 0 Nov 28 20:01 uid_map -r--r--r-- 1 root root 0 Nov 28 20:01 wchan admin@i-03c3097309a075b56:/proc/576$ cd map_files/ bash: cd: map_files/: Permission denied admin@i-03c3097309a075b56:/proc/576$ ls -l^C admin@i-03c3097309a075b56:/proc/576$ less smaps smaps: Permission denied admin@i-03c3097309a075b56:/proc/576$ cat smaps cat: smaps: Permission denied admin@i-03c3097309a075b56:/proc/576$ stra^C admin@i-03c3097309a075b56:/proc/576$ strace -p 576 strace: attach: ptrace(PTRACE_SEIZE, 576): Operation not permitted admin@i-03c3097309a075b56:/proc/576$
paris/i-03c3097309a075b56 01:47
by SadServerscloud-final.service loade cloud-init-local.service loade cloud-init.service loade cron.service loade dbus.service loade flaskapp.service loade getty@tty1.service loade gotty.service loade ifup@ens5.service loade ifupdown-pre.service loade kmod-static-nodes.service loade networking.service loade rsyslog.service loadeadmin@i-06898348f67e369be:/etc/apache2/conf-available$ admin@i-06898348f67e369be:/etc/apache2/conf-available$
paris/i-06898348f67e369be 04:35
by SadServersConnection to host.example.com 25 port [tcp/smtp] succeeded! The port range was specified to limit the search to ports 20 - 30, and is s der (unless the -r flag is set). You can also specify a list of ports to scan, for example: $ nc -zv host.example.com http 20 22-23 nc: connect to host.example.com 80 (tcp) failed: Connection refused nc: connect to host.example.com 20 (tcp) failed: Connection refused Connection to host.example.com port [tcp/ssh] succeeded! nc: connect to host.example.com 23 (tcp) failed: Connection refused The ports are scanned by the order you given (unless the -r flag is set). Manual page nc(1) line 219/313 84% (press h for help or q to quit)